Exam 10: CompTIA Network+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased?

(Multiple Choice)
4.8/5
(36)

Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?

(Multiple Choice)
4.9/5
(33)

A technician has started a major network project to upgrade to a higher throughput standard. The technician will need to install new patch panels and breakout boxes to support this infrastructure. Which of the following layers of the OSI model is the technician addressing at this stage of the upgrade?

(Multiple Choice)
4.9/5
(30)

A network technician is deploying mobile phones for a company's sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?

(Multiple Choice)
4.8/5
(37)

According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Choose two.)

(Multiple Choice)
4.7/5
(36)

Which of the following physical security controls is MOST likely to be susceptible to a false positive?

(Multiple Choice)
4.8/5
(35)

A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

(Multiple Choice)
4.9/5
(46)

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

(Multiple Choice)
4.9/5
(38)

A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use?

(Multiple Choice)
4.7/5
(34)

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

(Multiple Choice)
4.8/5
(35)

A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?

(Multiple Choice)
4.8/5
(42)

Which of the following is a system of notation that uses base 16 rather than base 10?

(Multiple Choice)
4.8/5
(31)

A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server's local firewall? (Choose two.)

(Multiple Choice)
4.8/5
(36)

A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following should be applied as the LAST rule in the firewall?

(Multiple Choice)
4.8/5
(36)

A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?

(Multiple Choice)
4.9/5
(39)

A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?

(Multiple Choice)
4.9/5
(40)

Which of the following protocols is used by Active Directory for authentication?

(Multiple Choice)
4.7/5
(26)

Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?

(Multiple Choice)
4.8/5
(30)

A network technician has just implemented a new wireless network that requires clients to use a WEP key for access. The technician is now required to make changes to ensure the network uses the strongest encryption available. After the changes are implemented, several users report being unable to connect. Which of the following is the MOST likely cause?

(Multiple Choice)
4.8/5
(31)

A company has decided to allow certain users to work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and to specific areas on the network. Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?

(Multiple Choice)
5.0/5
(27)
Showing 181 - 200 of 829
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)